Information Security and Cryptology
Springer Verlag, Singapore
978-981-95-6205-3 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections:
Part I : Post-Quantum Cryptography; Functional Encryption; Cryptanalysis and Implementations I; Cryptanalysis and Implementations II.
Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models; Network Security & Traffic Analysis.
Part III : Privacy Preserving/Enhancing Technologies; AI and Security I; AI and Security II.
.- Post-Quantum Cryptography.
.- Further Research on Meet-LWE and Its Application to Weakened Kyber.
.- Efficient Implementation of Post-Quantum Signature Algorithms for Next Generation of Blockchains.
.- Accelerating NTRU-based Bootstrapping with Block Key Distributions.
.- Lattice IBE from Non-spherical Gaussian Sampling with Tight Security.
.- Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE.
.- An Area-Performance Balanced Hardware Accelerator of NTT for Kyber.
.- A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation.
.- Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model.
.- Speedy Error Reconciliation.
.- Functional Encryption.
.- A Note on the Simpler Construction to Achieve Dynamic FE via IBE.
.- Onion Encryption Revisited: Relations Among Security Notions.
.- New Key Combiner Schemes for Multiple Keys.
.- Wildcarded Identity-Based Inner Product Encryption Based on SM9.
.- Dual-Threshold Verifiable Witness Encryption for Signatures and its Applications.
.- Cryptanalysis and Implementations I.
.- Improved Quantum Cryptanalysis on Generalized Feistel Structure.
.- Algebraic Cryptanalysis on Reduced-round Trivium-LE.
.- Automated Periodic Distinguisher Search for AND-RX Ciphers.
.- Efficient Reconstruction of S-boxes from Partial Cryptographic Tables via MILP Modeling.
.- Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification.
.- Arithmetic Autocorrelation of Certain Binary Half-ℓ-sequences.
.- Related-Key Rectangle Attacks on Round-Reduced TWINE.
.- TwoLayerF: A Two-Layer Framework of PNB-based Key Recovery Attacks on ChaCha.
.- Exploring AI-Assisted Cryptanalytic Attacks on Multisets.
.- Distributed Quantum Key Recovery Attack on Pseudorandom Functions.
.- Cryptanalysis and Implementations II.
.- An Area-Efficient Design of ZUC-256 Through Hardware Optimization.
.- Revisit Bitslice Implementation of Dummy Shuffling.
.- TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation.
.- Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset.
.- Bit-by-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation.
.- Multi-feature Fusion Leakage Abuse Attacks against Dynamic Searchable Symmetric Encryption.
.- A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack against Kyber.
| Erscheint lt. Verlag | 3.2.2026 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XX, 579 p. |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Grafik / Design ► Digitale Bildverarbeitung |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Schlagworte | Adversarial Attack • Anomaly Detection • Blockchain • Cryptanalysis • Deep learning • differential privacy • Encrypted Traffic Inspection • federated learning • functional encryption • homomorphic encryption • Large language model • lattice • privacy preserving • Private Set Intersection • secure multi-party computation • Zero-knowledge |
| ISBN-10 | 981-95-6205-8 / 9819562058 |
| ISBN-13 | 978-981-95-6205-3 / 9789819562053 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich